From mboxrd@z Thu Jan 1 00:00:00 1970 From: erik quanstrom Date: Tue, 27 Sep 2016 20:08:33 -0700 To: 9fans@9fans.net Message-ID: <4efaa7a085cf6219270cbec2771ef83b@mule> In-Reply-To: References: <10164dc26ad9444e5e4e4d99132c8ea5@felloff.net> <60ebf215-a387-4a19-ad6a-14e8cb08c23c@email.android.com> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Subject: Re: [9fans] upas/send -r Topicbox-Message-UUID: a0e6ec54-ead9-11e9-9d60-3106f5b1d025 On Fri Sep 23 18:40:00 PDT 2016, jules.merit.eurocorp.us@gmail.com wrote: > My cable company set my IP to my home address. All sorts of MITM, spoofing. > eurocorp.us (68.111.201.89) EscondidoCounty 1829 > There are 9fans in JadeHelm wargames. > I'm James Jake Niantic, .dk Orphilla. > (6:19)pm confirmed Erich, I ChKe > > On Fri, Sep 23, 2016 at 6:19 PM, Erik Quanstrom > wrote: > > > that's an interesting topic. I believe the best approach is to reject the > > incoming connection. the bypass mods are pretty good at rejecting bogus > > sends by just enforcing RFC rules for helo. the rfc only requires that the helo be a valid dns name. so you would not be filtered based on spoofing, but you would be filtered if you said you were machine.local, as many windows boxes do by default. - erik